public inbox for u-boot@lists.denx.de
 help / color / mirror / Atom feed
From: Richard Weinberger <richard@nod.at>
To: u-boot@lists.denx.de
Cc: Joe Hershberger <joe.hershberger@ni.com>,
	Ramon Fried <rfried.dev@gmail.com>,
	trini@konsulko.com
Subject: Re: [PATCH] net: wget: Avoid packet queue overflow
Date: Thu, 31 Aug 2023 12:27:59 +0200 (CEST)	[thread overview]
Message-ID: <404816774.38.1693477679941.JavaMail.zimbra@nod.at> (raw)
In-Reply-To: <20230720125156.31773-1-richard@nod.at>

----- Ursprüngliche Mail -----
> Von: "richard" <richard@nod.at>
> An: u-boot@lists.denx.de
> CC: "richard" <richard@nod.at>, "Joe Hershberger" <joe.hershberger@ni.com>, "Ramon Fried" <rfried.dev@gmail.com>
> Gesendet: Donnerstag, 20. Juli 2023 14:51:56
> Betreff: [PATCH] net: wget: Avoid packet queue overflow

> Make sure to stay within bounds, as a misbehaving HTTP server
> can trigger a buffer overflow if not properly handled.
> 
> Cc: Joe Hershberger <joe.hershberger@ni.com>
> Cc: Ramon Fried <rfried.dev@gmail.com>
> Signed-off-by: Richard Weinberger <richard@nod.at>
> ---
> net/wget.c | 10 +++++++++-
> 1 file changed, 9 insertions(+), 1 deletion(-)
> 
> diff --git a/net/wget.c b/net/wget.c
> index 2dbfeb1a1d5b..8bb4d72db1ae 100644
> --- a/net/wget.c
> +++ b/net/wget.c
> @@ -35,7 +35,8 @@ struct pkt_qd {
>  * The actual packet bufers are in the kernel space, and are
>  * expected to be overwritten by the downloaded image.
>  */
> -static struct pkt_qd pkt_q[PKTBUFSRX / 4];
> +#define PKTQ_SZ (PKTBUFSRX / 4)
> +static struct pkt_qd pkt_q[PKTQ_SZ];
> static int pkt_q_idx;
> static unsigned long content_length;
> static unsigned int packets;
> @@ -202,6 +203,13 @@ static void wget_connected(uchar *pkt, unsigned int
> tcp_seq_num,
> 		pkt_q[pkt_q_idx].tcp_seq_num = tcp_seq_num;
> 		pkt_q[pkt_q_idx].len = len;
> 		pkt_q_idx++;
> +
> +		if (pkt_q_idx >= PKTQ_SZ) {
> +			printf("wget: Fatal error, queue overrun!\n");
> +			net_set_state(NETLOOP_FAIL);
> +
> +			return;
> +		}
> 	} else {
> 		debug_cond(DEBUG_WGET, "wget: Connected HTTP Header %p\n", pkt);
> 		/* sizeof(http_eom) - 1 is the string length of (http_eom) */

Friendly ping. :-)

Thanks,
//richard

  reply	other threads:[~2023-08-31 10:28 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-07-20 12:51 [PATCH] net: wget: Avoid packet queue overflow Richard Weinberger
2023-08-31 10:27 ` Richard Weinberger [this message]
2023-08-31 16:27   ` Tom Rini
2023-09-22 17:42     ` Richard Weinberger
2023-09-22 22:26 ` Tom Rini

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=404816774.38.1693477679941.JavaMail.zimbra@nod.at \
    --to=richard@nod.at \
    --cc=joe.hershberger@ni.com \
    --cc=rfried.dev@gmail.com \
    --cc=trini@konsulko.com \
    --cc=u-boot@lists.denx.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox